Aggregator
Submit #625492: phpgurukul Boat Booking System V1.0 SQL Injection [Duplicate]
Submit #625262: phpgurukul Boat Booking System V1.0 SQL Injection [Accepted]
CVE-2025-8286 | Güralp FMUS Series Seismic Monitoring Device Telnet-based Command Line Interface missing authentication (icsa-25-212-01 / EUVD-2025-23300)
Submit #625358: phpgurukul Boat Booking System V1.0 SQL Injection [Duplicate]
Submit #625207: phpgurukul Boat Booking System V1.0 SQL Injection [Duplicate]
CVE-2025-7646 | Plus Addons for Elementor Plugin up to 6.3.10 on WordPress cross site scripting
CVE-2025-51503 | Microweber CMS 2.0 User Profile cross site scripting (EUVD-2025-23298)
Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations
Key Findings Introduction Check Point Research (CPR) has been closely monitoring the ongoing exploitation of a group of Microsoft SharePoint Server vulnerabilities collectively referred to as “ToolShell.” These active attacks leverage four vulnerabilities—CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771—and are attributed to multiple China affiliated threat actors. Among the threat groups identified by Microsoft, two are known […]
The post Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations appeared first on Check Point Research.
CVE-2025-51383 | D-Link DI-8200 16.07.26A1 ipsec_road_asp host_ip buffer overflow (EUVD-2025-23296)
CVE-2025-54832 | OPEXUS FOIAXpress Public Access Link 11.1.0 external control of assumed-immutable web parameter (EUVD-2025-23293)
CVE-2025-51385 | D-Link DI-8200 16.07.26A1 yyxz_dlink_asp ID buffer overflow (EUVD-2025-23290)
CVE-2025-51384 | D-Link DI-8200 16.07.26A1 ipsec_net_asp remot_ip buffer overflow (EUVD-2025-23294)
CVE-2025-54834 | OPEXUS FOIAXpress Public Access Link 11.1.0 /App/CreateRequest.aspx observable response discrepancy (EUVD-2025-23292)
CVE-2025-54833 | OPEXUS FOIAXpress Public Access Link 11.1.0 CAPTCHA excessive authentication (EUVD-2025-23291)
Everest
You must login to view this content
CVE-2025-8426 | Marvell QConvergeConsole 5.5.0.78 compressConfigFiles path traversal (ZDI-25-733 / EUVD-2025-23297)
Everest
You must login to view this content
Threat Actors Use Malicious RMM Tools for Stealthy Initial Access to Organizations
A small increase in targeted cyberattacks that make use of Remote Monitoring and Management (RMM) capabilities that are embedded in PDF documents has been seen by WithSecure. These campaigns primarily focus on organizations in France and Luxembourg, employing socially engineered emails to deliver innocuous PDFs containing hyperlinks to legitimate RMM installers. This method effectively circumvents […]
The post Threat Actors Use Malicious RMM Tools for Stealthy Initial Access to Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.